Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption

被引:8
|
作者
Kitagawa, Fuyuki [1 ]
Tanaka, Keisuke [1 ]
机构
[1] Tokyo Inst Technol, Tokyo, Japan
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I | 2018年 / 10769卷
关键词
Identity-based encryption; Key dependent message security; Receiver selective opening security;
D O I
10.1007/978-3-319-76578-5_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We construct two identity-based encryption (IBE) schemes. The first one is IBE satisfying key dependent message (KDM) security for user secret keys. The second one is IBE satisfying simulation-based receiver selective opening (RSO) security. Both schemes are secure against adaptive-ID attacks and do not have any a-priori bound on the number of challenge identities queried by adversaries in the security games. They are the first constructions of IBE satisfying such levels of security. Our constructions of IBE are very simple. We construct KDM secure IBE by transforming KDM secure secret-key encryption using IBE satisfying only ordinary indistinguishability against adaptive-ID attacks (IND-ID-CPA security). Our simulation-based RSO secure IBE is based only on IND-ID-CPA secure IBE. We also demonstrate that our construction technique for KDM secure IBE is used to construct KDM secure public-key encryption. More precisely, we show how to construct KDM secure public-key encryption from KDM secure secret-key encryption and public-key encryption satisfying only ordinary indistinguishability against chosen plaintext attacks.
引用
收藏
页码:32 / 61
页数:30
相关论文
共 50 条
  • [41] Accountable identity-based encryption with distributed private key generators
    Zhao, Zhen
    Wu, Ge
    Susilo, Willy
    Guo, Fuchun
    Wang, Baocang
    Hu, Yupu
    INFORMATION SCIENCES, 2019, 505 : 352 - 366
  • [42] Dealerless Corporate Key Generation for Identity-Based Encryption Schemes
    Liu, Zhen
    Wong, Duncan S.
    Poon, Jack
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 211 - 222
  • [43] Remove key escrow from the Identity-Based Encryption system
    Cheng, ZH
    Comley, R
    Vasiu, L
    EXPLORING NEW FRONTIERS OF THEORETICAL INFORMATICS, 2004, 155 : 37 - 50
  • [44] A Stateful Multicast Key Distribution Protocol Based on Identity-based Encryption
    Wu, Yunyun
    Liu, Jing
    Hou, Jingyu
    Yao, Shaowen
    2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 19 - 24
  • [45] Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption
    Zhou, Yanwei
    Wang, Zhaolong
    Qiao, Zirui
    Wang, Ying
    Yang, Bo
    Mu, Yi
    Zhang, Mingwu
    COMPUTER JOURNAL, 2023, 66 (04) : 924 - 940
  • [46] Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
    Hofheinz, Dennis
    Koch, Jessica
    Striecks, Christoph
    JOURNAL OF CRYPTOLOGY, 2024, 37 (02)
  • [47] Achieving Cloud Security using Third Party Auditor, MD5 and Identity-Based Encryption
    Gajendra, Bhale Pradeepkumar
    Singh, Vinay Kumar
    Sujeet, More
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1304 - 1309
  • [48] Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
    Dennis Hofheinz
    Jessica Koch
    Christoph Striecks
    Journal of Cryptology, 2024, 37
  • [49] Efficient Selective Identity-Based Encryption Without Random Oracles
    Boneh, Dan
    Boyen, Xavier
    JOURNAL OF CRYPTOLOGY, 2011, 24 (04) : 659 - 693
  • [50] Efficient Selective Identity-Based Encryption Without Random Oracles
    Dan Boneh
    Xavier Boyen
    Journal of Cryptology, 2011, 24 : 659 - 693